Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42070 | Magento Open Source allows SQL Injection |
Github GHSA |
GHSA-h3g9-cwr6-hphx | Magento Open Source allows SQL Injection |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Sep 2024 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Time-based blind SQL injection via customer segment rule configuration at POST /admin/customersegment/index/save/key/{key}/back/edit address attribute | Adobe Commerce | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89) |
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2025-02-27T20:41:16.162Z
Reserved: 2023-07-13T16:21:52.617Z
Link: CVE-2023-38250
Updated: 2024-08-02T17:39:12.047Z
Status : Modified
Published: 2023-10-13T07:15:41.420
Modified: 2024-11-21T08:13:10.920
Link: CVE-2023-38250
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA